Across the globe, companies are rushing to implement work from home solutions that can help staff stay productive while working remotely. One of the easiest ways to get staff up and running is by using the same method they’ve been using in the office – mapped drives. Users in the office already know how to map a network drive or folder to their file explorer. By binding the file or folder’s Universal Naming Convention (UNC) path, every time the user logs into the Active Directory (AD) on the domain, they’ll have access to all their mapped folders.

Remote access requires users to authenticate with the AD before they can access any internal network resources. One way to do this is with a Virtual Private Network (VPN) but setting them up can challenge even the most experienced IT professional.

Some companies may opt to use the WebDAV (Web Distributed Authoring and Versioning) protocol. This is an extension of the Hypertext Transfer Protocol (HTTP) to allow co-authoring and management of files over the internet. But before implementing this as a solution, companies should know there are a few WebDAV issues to consider.

How WebDAV Security Issues Can Put Companies at Risk

WebDAV started in the 1990s, and its implementation ended in 2006. Since then, it received limited support and updates, although it’s extensively used in other drive explorers and mapping applications. By itself, WebDAV poses a security risk to a firm while contained in another application – a security report even strongly suggested that companies make an effort to disable it. Implementing WebDAV as a remote access protocol can pose a significant risk to company information.

Network security evolved over the last fifteen years, adding new layers and protocols to corporate systems. WebDAV, due to its age, didn’t keep up with these developments. Although there are ways to secure WebDAV with SSL and two-factor authentication, it doesn’t have a user-friendly interface and forgetting one step can put the entire network at risk.

To ensure the company doesn’t suffer a devastating data loss or cyber crime incident, it’s better to look for a WebDAV alternative. Choosing a cloud file sharing solution is a viable option for companies that need to work collaboratively from different locations.

The rise of cloud services enabled remote teams to operate productively, collaborate effectively, and synchronize work frequently. As most companies use file servers to manage their information, making these available remotely doesn’t necessarily require a complete cloud migration.

With CentreStack, the company can control all their information using their existing infrastructure while making it accessible to remote workers. Compared to WebDAV (and other solutions that use the implementation like Egnyte and Anchor), CentreStack is a safe and secure cloud file sharing solution that won’t put the company’s information at risk.

3 Benefits of Using CentreStack as a Cloud Drive Mapper

Whenever a new product enters the company’s ecosystem, it requires extensive research, testing, and validation before releasing it for use. However, one of the major issues with moving to a cloud sharing solution is that it doesn’t incorporate these controls into its security and access models. A hybrid deployment could easily double the workload of IT resources.

Opting to use CentreStack as a hybrid cloud deployment system can overcome current challenges while improving the company’s future resilience. It integrates with the existing solutions like the NTFS permissions and AD role definitions, helping employees access their shared folders remotely using the existing mappings and permissions.

Read on to see how CentreStack helps a business establish an effective remote access solution.

1. Uses Native File System Permissions to Control Access

By integrating with existing protocols, it reduces the implementation overheads on IT staff. The IT department can manage all access control in CentreStack or keep using the Windows file server to distribute the policies. With an integrated solution, the company can have a remote file sharing solution within minutes instead of weeks.

2. Doesn’t Require Configuration Changes to the Corporate Network

Instead of configuring network settings for remote file sharing, CentreStack extends the existing settings while providing a safe and secure remote interface. The interface provides a unified experience similar to the office environment so staff will not require any additional training. It also gives staff access to their files from any connected device including mobiles and web browsers.

3. Reduces Bandwidth Requirements for File Access

Companies can use CentreStack as a complete cloud migration tool, a hybrid deployment, or a remote access solution. As the software uses compression to transfer files between the cloud and corporate network, it reduces the bandwidth required to access files. CentreStack also has a Direct Access mode that synchronizes files and caches locally to improve performance. To ensure compliance and traceability, a complete audit trail of the file change history is also available.

Keep Company Data Accessible and Secured with CentreStack

Companies will have to come to terms with the new remote infrastructure required to keep staff operating productively. CentreStack is a versatile platform that can solve the immediate challenges while integrating perfectly with the company’s long-term cloud migration strategy.

When creating a new user, under Team Folders list, we've added the option to Select All, Deselect and Undo Selection for all team folders.When deleting a guest user, you can now delete the user's permission on existing shares.We've enhanced accessing AD user's home drive when it is imported in Centrestack.We've enhanced the Role tab whenever you want to edit a user and refresh the role assignment.When viewing the tenant admin's Storage Usage Details, the user's quota is displayed correctly.'Allow syncing of empty files' only applies to attached folders.We've enhanced accessing Shared files/folders on the web portal when one user who creates a share is deactivated.Make sure the user cannot launch the windows client when the server agent is installed.We've …

You want to ensure that company confidential data is secure and there is no data leakage. Tenant Managers can activate 'Disable Public Link' which will ensure that users are not allowed to send public links for company's confidential data to external users.

This video shows how you can use this important Group Policy setting to activate this feature.